Real-time chaff generation for a biometric fuzzy vault

Real-time chaff generation for a biometric fuzzy vault

Biometric technology is rapidly being adopted in wide variety of security applications. However, the system itself is not completely foolproof and is vulnerable to many attacks. Some of the attacks on the biometric system are very severe, one of which is the attack on template security. In spite of the various template security techniques presented in the literature, none of them is able to provide security, diversity, revocability, and good performance simultaneously to the biometric system. Fuzzy vault is one of the most promising bio-cryptographic techniques to prevent the template data from being misused. To make the fuzzy vault practically realizable in real-life applications especially for large databases, the chaff generation time needs to be reduced to a greater extent. This work focuses on decreasing the chaff generation time to reduce the overall vault creation time. The approach presented in the paper has also been tested on real-time dedicated hardware using ngerprint data acquired in real time by using a ngerprint sensor Veri er 300LC to bridge the gap between the research and real-time application scenarios.

___

  • [1] Jain AK, Ross A, Prabhakar S. An introduction to biometric recognition. IEEET Circ Syst Vid 2004; 14: 4-20.
  • [2] Maltoni D, Maio D, Jain AK, Parbhakar S. Handbook of Fingerprint Recognition. 2nd ed. London, UK: Springer, 2003.
  • [3] Uludag U, Pankanti S, Parbhakar S, Jain AK. Biometric Cryptosystems: Issues and Challenges. In: Proceedings of IEEE 2004; 92: 948-960.
  • [4] Jain AK, Ross A, Uludag U. Biometric Template Security: Challenges and Solutions. In: Proceedings of 13th European Signal Processing Conference (EUSIPCO); 4 September 2005. Antalya, Turkey: IEEE. pp. 1-4.
  • [5] Ratha NK, Connell JH, Bolle RM. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 2001; 40: 614-634.
  • [6] Jain AK, Nandakumar K, Nagar A. Biometric template security. EURASIP J Adv Sig Pr 2008; 2008: 579416.
  • [7] Juels A, Sudan M. A fuzzy vault scheme. In: Proceedings of the IEEE 2002 International Symposium on Information Theory; 30 June{5 July 2002. New York, NY, USA: IEEE. p. 408.
  • [8] Clancy TC, Kiyavash N, Lin DJ. Secure smartcard-based ngerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications; 8 November 2003. New York, NY, USA: ACM. pp. 45-52.
  • [9] Uludag U, Pankanti S, Jain AK. Fuzzy vault for ngerprints. In: Proceedings of the Fifth International Conference on Audio- and Video-Based Biometric Person Authentication; 20{22 July 2005; Hilton Rye Town, NY, USA. Berlin, Germany: Springer. pp. 310-319.
  • [10] Khalil-Hani M, Marsono MN, Bakhteri R. Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener Comp Sy 2013; 29: 800-810.
  • [11] Khalil-Hani M, Bakhteri R. Securing cryptographic key with fuzzy vault based on a new chaff generation method. In: IEEE 2010 International Conference on High Performance Computing and Simulation; 28 June 2010. New York, NY, USA: IEEE. pp. 259-265.
  • [12] Nandakumar K, Jain AK, Pankanti S. Fingerprint-based fuzzy vault: implementation and performance. IEEE T Inf Foren Sec 2007; 2: 744-757.
  • [13] Uludag U, Jain A. Securing ngerprint template: fuzzy vault with helper data. In: IEEE 2006 Conference on Computer Vision and Pattern Recognition Workshop; 17{22 June 2006; Washington, DC, USA. New York, NY, USA: IEEE. pp. 163-163.
  • [14] Chung Y, Moon D, Lee S, Jung S, Kim T, Ahn D. Automatic alignment of ngerprint features for fuzzy ngerprint Vault. In: International Conference on Information Security and Cryptology; December 2005; Berlin, Germany: Springer. pp. 358-369.
  • [15] Hooda R, Kaur M. Novel chaff generation for ngerprint fuzzy vault. British Journal of Mathematics & Computer Science 2015; 10: 1-9.
  • [16] Nguyen TH, Wang Y, Nguyen TN, Li R. A ngerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: IEEE 2013 International Conference on Signal Processing, Communication and Computing; 5{8 August 2013. New York, NY, USA: IEEE. pp. 1-6.
  • [17] Nguyen TH, Wang Y, Ha Y, Li R. Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrics 2013; 2: 48-55.
  • [18] Benhammadi F, Bey KB. Password hardened fuzzy vault for ngerprint authentication system. Image Vision Comput 2014; 32: 487-496.
  • [19] Nguyen MT, Truong QH, Dang TK. Enhance fuzzy vault security using nonrandom chaff point generator. Inform Process Lett 2016; 116: 53-64.
  • [20] Nguyen TH, Wang Y, Ha Y, Li R. Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted ngerprints. IET Biometrics 2015; 4: 29-39.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK